Preferred Language
Articles
/
MhbO7YsBVTCNdQwC0eVD
THE PARADOX OF A POSTMODERN TECHNOLOGY IN SARAH RUHL’S DEAD MAN’S CELL PHONE
...Show More Authors

Crossref
View Publication
Publication Date
Fri Sep 09 2022
Journal Name
Surgical Neurology International
WhatsApp as a remote patient-monitoring tool in low- and middle-income countries: Experience from the cerebrovascular surgery service in Iraq
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (5)
Scopus Crossref
Publication Date
Sun Nov 16 2025
Journal Name
Lecture Notes In Networks And Systems
The Extent to Which Public Relations Departments in Government Institutions Use Artificial Intelligence Applications in Their Communication Activities: A Field Study
...Show More Authors

Abstract This study explores the extent to which public relations (PR) departments within Traqj governmental institutions are integrating artificial intelligence (AI) applications into their communication activities. The research adresses the growing importanc of AI in enhancing administrative efficieney, communication transparency, and stakeholder engagement. Adopting a descriptive research design, the study relied on an electtonic questionnaire distributed to PR profesionals across various ministries and government bodies, collecting 100 valid responses. The indings reveal that while younger PR practitioners are actively embracing AI, older employees show limited engagement. Most participants acquired AI-related skills through self- learn

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Biomechanics
In vitro wear testing of a contemporary design of reverse shoulder prosthesis
...Show More Authors

Reverse shoulder arthroplasty is an increasingly common surgical intervention. However there are concerns and known limitations in relation to such joint replacement, while novel designs of reverse shoulder prostheses continue to appear on the market. Many claim to offer improvements over older designs but such assertions are difficult to validate when there is no consensus as to how such implants should be tested in vitro or even if such testing is necessary. In order to permit appropriate in vitro testing of reverse shoulder prostheses a unique, multi-station test rig was designed which was capable of applying motion in three axes to test prostheses. The shoulder simulator can apply up to 110° of motion in the flexion–extension and abd

... Show More
View Publication
Scopus (29)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey of deepfakes in terms of deep learning and multimedia forensics
...Show More Authors

Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Determine The Factors Affecting Product Quality Using FMEA Analysis: A Case Study in Al Zawraa State Company
...Show More Authors

 

The research aims to identify the factors that affect the quality of the product by using the Failure Mode and Effect Analysis (FMEA) tool and to suggest measures to reduce the deviations or defects in the production process. I used the case study approach to reach its goals, and the air filter product line was chosen in the air filters factory of Al-Zawraa General Company. The research sample was due to the emergence of many defects of different impact and the continuing demand for the product. I collected data and information from the factory records for two years (2018-2019) and used a scheme Pareto Fishbone Diagram as well as an FMEA tool to analyze data and generate results.

Par

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Formulate a strategy to manage tax compliance risks: An applied research in the General commission for Taxes
...Show More Authors

  This research discussed and analyzed the formulation of a strategy to manage tax compliance risks, as an applied research in the General commission for Taxes. The questionnaire was used as a research tool to identify the factors that stimulate or retard the research sample from being compliant. The K-means clustering method was also used to enable the classification of the research sample's views into four behaviors, some of these views pose tax-compliance risks. The research concluded that risk management is a continuous process and that all departments of the General commission for Taxes are responsible for its implementation to enable them to deal with the behavior of the taxpayer towards tax compliance. And it recommended

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 16 2024
Journal Name
Ecancermedicalscience
Prostate cancer across four countries in the Middle East: a multi-centre, observational, retrospective and prognostic study
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Relational leadership and its effect on organizational energy (A comparative study in the Rafidain and Rashid banks)
...Show More Authors

This research aims to test the relationship between "relational leadership as an independent variable and organizational energy as a dependent variable. The current research variables are among the recent and important variables for the development of organizations, and for the purpose of explaining the relationship and influence between the variables, a set of goals has been formulated, including providing the interested and scientific and theoretical information explaining the nature of the variables The research, and the extent to which its causes are reflected in the research sample to increase the interest of the research organization’s organization and make it more appropriate to the required performance in light of a cha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 03 2025
Journal Name
Sar Journal Of Pathology And Microbiology
The Relation between Tumor Infiltrating Lymphocyte and Classical Tumor Staging in Colorectal Carcinoma (Semi-Quantitative Study by Immun histochemistry in a Group of Iraqi Patients)
...Show More Authors

Inflammatory response had a role in cancer progression, presence of noticeable inflammation within the tumor and its margin may play an important prognostic role in colorectal carcinoma.

Preview PDF